Can a user apply for another public key based on its pseudonym and use the obtained public key in DH key exchange?
用户可以申请一个公共密钥基础上的假名,DH密钥交换使用所获得的公共密钥?
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
If access is based entirely on self-signed certificates, deleting the public key of a certificate from the trust store revokes its access.
如果访问完全基于自签名证书,则从信任存储区中删除证书的公钥将撤销其访问权。
Unless your API is a free, read-only public API, don't use single key-based authentication.
除非你的API是一个免费的,只读的公开api,否则不要使用单一的基于密钥的验证。
This password check is done even if the user is following the public key or host-based authentication.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
This process is, in turn, based on the public key of the signer.
相反,这个过程是基于签名者的公有密钥的。
Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.
公钥-私钥组合是公共密钥基础设施的核心,建立在非对称密码的基础上。
The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.
SSL协议基于公钥密码,加密密钥成对地出现在公钥密码中,它们是在数学上是相关的,但无法由一个推知另一个。
So for applications that need to have a GSS-API mechanism which is based on a public-key infrastructure, SPKM is the answer.
因此,当应用程序需要一种基于公共密钥基础设施的GSS-API机制时,SPKM 就能满足它的要求。
An SSH-based identity consists of two parts: a public key and a private key.
一个基于ssh的身份包括两个部分:一个公钥和一个私钥。
RSA public-key cryptography is based on this property of factorization.
RSA公钥密码系统就是基于这种因数分解特性的。
It then describes how you can achieve authentication based on public key technology, using the new GSS-API security mechanisms with the customizable DB2 UDB security plug-ins.
然后还将描述:如何通过使用新的具有可定制的DB 2UDB安全插件的GSS - API安全机制来实现基于公钥技术的身份验证。
The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.
公钥密码启用的安全性服务是基于这样的消息解密机制,即共有密钥只能通过相应的私有密钥才能解密,反之亦然。
As you saw in Part 1, this public key would be based on the RSA algorithm.
您从第1部分中可以看到,这个公钥是基于rsa算法生成的。
As described earlier, the public-private key pair is based on the RSA algorithm.
前面讲过,公-私密钥对是基于rsa算法的。
SPKM is a GSS-API mechanism which is based on a public key rather than a symmetric key infrastructure.
SPKM是一种GSS - API机制,其基于公钥而非对称密钥基础设施。
No SSH server configuration is necessary, since, by default, SSH will attempt to use public key-based authentication before password based authentication.
这里不需要ssh服务器配置,因为在默认情况下,在基于密码的认证之前,ssh将尝试使用基于公钥的认证。
Comparing host-based authentication to public key-based authentication.
比较基于主机的认证和基于公钥的认证。
Type the following command on a single line to create a key pair and self-signed public key certificate to represent the J2EE-based EchoService client.
在一行中键入下面的命令创建密钥对和自签署的公钥证书,以表示基于J2EE的EchoService客户机。
Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).
而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问)。
Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.
使用ssh的基于主机的认证和基于公钥的认证都比基于rshrhost的认证安全。
OpenSSH supports two types of encryption, namely host-based authentication and public-key authentication.
OpenSSH支持两种类型的加密,即基于主机的认证和公钥认证。
At this point, ssh public key-based authentication is now complete, and you can proceed to " DB2 configuration."
至此,ssh 基于公钥的认证已经完成,现在可以进入“DB2配置”。
To guarantee the system safe, this thesis designed a new kind of Identity certification method based on the mode of keywords and public-key certification.
为了保证本系统的安全性,本论文结合基于口令和公钥的认证模式,设计了一种新型的身份认证方法。
A distributed key generation protocol for public key cryptosystem based on discrete-log is proposed using generalized verifiable secret sharing.
利用广义可验证秘密分享,提出了基于离散对数的公钥体制的密钥的分布式生成协议。
Elliptic curve cryptosystem is a kind of public-key cryptosystem based on algebra curve.
椭圆曲线密码体制是一种基于代数曲线的公开钥密码体制。
Both the symmetric key systems and public key systems currently used are based on the model of computational security.
目前的密钥系统无论是单钥体制还是公钥体制都建立在计算安全的模型上。
By introducing public key cryptosystem to the authentication mechanism, the author proposed a 3g authentications and key agreement protocol based on public key cryptosystem.
在认证机制中引入公钥密码体制,提出了一个基于公钥密码体制的3g认证与密钥分配协议。
This paper presents a blind group signature scheme based on XTR public key system, and analyzes its security and efficiency.
本论文提出了一种基于XTR公钥体制的盲群签名方案并分析了其安全性和效率。
Therefore constructing identity-based public key architecture has become a new approach to solve secure Email problem.
构造基于身份的公钥系统已成为解决电子邮件安全问题的一种新的途径。
应用推荐